{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T22:15:02Z","timestamp":1775081702308,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/globecom46510.2021.9685386","type":"proceedings-article","created":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T21:59:04Z","timestamp":1643839144000},"page":"01-06","source":"Crossref","is-referenced-by-count":4,"title":["Privacy-Preserving Friend Matching for Mobile Social Networks"],"prefix":"10.1109","author":[{"given":"Yaqing","family":"Song","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China,School of CSE,China"}]},{"given":"Chunxiang","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of CSE,China"}]},{"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of CSE,China"}]},{"given":"Nan","family":"Cheng","sequence":"additional","affiliation":[{"name":"Xidian University,School of Telecommunication,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195711"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2940343.2948717"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1649-y"},{"key":"ref13","first-page":"2634","article-title":"Privacy-preserving data aggregation without secure channel: Multivariate poly-nomial evaluation","author":"jung","year":"0","journal-title":"Proc INFOCOM"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2309134"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.200"},{"key":"ref16","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Advances in Cryptology - Eurocrypt"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref18","first-page":"1","article-title":"Efficient private matching and set intersection","author":"freedman","year":"0","journal-title":"Proc EUROCRYPT"},{"key":"ref19","first-page":"418","article-title":"Fast secure computation of set intersection","author":"jarecki","year":"0","journal-title":"Proc SCN"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.02.013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268965"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3321481"},{"key":"ref5","author":"krishnamurthy","year":"0","journal-title":"Privacy leakage in mobile online social networks"},{"key":"ref8","article-title":"Protect: efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage","author":"zhang","year":"2020","journal-title":"IEEE Trans Mobile Comput"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14311\/NNW.2017.27.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2016656.2016671"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2221924.2221927"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2322373"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.032513.120149"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935065"},{"key":"ref24","first-page":"1911","article-title":"Datasharenetwork: A decen-tralized privacy-preserving search engine for investigative journalists","author":"edalatnejad","year":"0","journal-title":"Proc Usenix Security Symposium"},{"key":"ref23","first-page":"155","article-title":"Efficient protocols for set intersection and pattern matching with security against malicious and covert adver-saries","author":"hazay","year":"0","journal-title":"Proc TCC"},{"key":"ref26","article-title":"Secure password-protected encryption key for deduplicated cloud storage systems","author":"zhang","year":"2021","journal-title":"IEEE Trans Dependable and Secure Comput"},{"key":"ref25","first-page":"514","article-title":"Short signatures from the weil pairing","author":"boneh","year":"0","journal-title":"Proc ASIACRYPT"}],"event":{"name":"GLOBECOM 2021 - 2021 IEEE Global Communications Conference","location":"Madrid, Spain","start":{"date-parts":[[2021,12,7]]},"end":{"date-parts":[[2021,12,11]]}},"container-title":["2021 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9685019\/9685006\/09685386.pdf?arnumber=9685386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T00:55:36Z","timestamp":1670374536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9685386\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/globecom46510.2021.9685386","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]}}}